Getting started with Red Hat OpenShift Service on AWS (ROSA)

Learn how to get started on Red Hat® OpenShift® Service on AWS, including how to use AWS Security Token Service (STS) to deploy a cluster. Once you’ve finished, proceed to part two and learn how to deploy an application on your new cluster.

You can also watch this interactive demonstration on how to install ROSA, from creating an account to deploying applications.

This learning path is for operations teams or system administrators

Developers may want to check out developers.redhat.com.

Get started on developers.redhat.com

Granting cluster admin rights to users in Red Hat OpenShift Service on AWS

5 mins

Cluster-admin rights are not automatically granted to users that you add to the cluster. If there are users that you want to grant this level of privilege to, you will need to manually add cluster-admin rights to each user.

What will you learn?

  • How to grant cluster admin rights to other users

What do you need before starting?

Grant cluster-admin rights

Let's start off with granting cluster-admin rights to ourselves using the GitHub username we created for the cluster in the Set up an IdP resource. There are two ways to do this; either from the Red Hat® OpenShift® on AWS command line interface (CLI) or the OpenShift Cluster Manager (OCM) web user interface (UI).

  1. Via rosa CLI
    1. Assuming you are the user who created the cluster, you can grant cluster-admin to a user (or our GitHub user) by running:

      rosa grant user cluster-admin --user <idp_user_name> --cluster=<cluster-name>

    2. Verify that we were added as a cluster-admin by running:

      rosa list users --cluster=<cluster-name>

      You should see your GitHub ID of the user listed.

      $ rosa list users --cluster=my-rosa-cluster
      
      ID           GROUPS
      
      rosa-user    cluster-admin

       

    3. Logout and log back into the cluster to see a new perspective with the “Administrator Panel”. (You might need to try an Incognito/Private window). 

      Screenshot of the OpenShift Cluster Manager user interface with a red outline around the Administrator menu in the left sidebar
    4. You can also test this by running the following command. Only a cluster-admin user can run this without errors:

      oc get all -n openshift-apiserver

    5. Via OCM UI
      1. Log into OCM from https://console.redhat.com/openshift
      2. Select your cluster.
      3. Click on the “Access Control” tab.
      4. Towards the bottom in the “Cluster Administrative Users” section click on “Add User.” 

        Screenshot of the Cluster Administrative Users section in the OpenShift Cluster Manager user interface with a red outline around the “Add user” button
      5. On the pop-up screen enter the person's user ID (in our example the GitHub ID).
      6. Select whether you want to grant them cluster-admin or dedicated-admin. 

        Screenshot of the form fields for adding a cluster user on OpenShift Cluster Manager with red outlines around the “cluster-admins” Group option and the “Add user” button

Granting dedicated-admin

ROSA has the option to set a “dedicated-admin” role, which means to create an admin user that can complete most administrative tasks but is slightly limited to prevent anything damaging. It is best practice to use dedicated-admin when elevated privileges are needed. You can read more about it here.

  1. Enter the following command to promote your user to a dedicated-admin:

    rosa grant user dedicated-admin --user <idp_user_name> --cluster=<cluster-name>

  2. Enter the following command to verify that your user now has dedicated-admin access

    oc get groups dedicated-admins

  3. You can also grant dedicated-admin rights via the OCM UI as described in the cluster-admin section, but just select the “dedicated-admins” radio button instead.

You are now ready to access your cluster.

Revoking access

In the event that you need to revoke cluster-admin or dedicated-admin access, it can be done through the following steps:

  1. From the ROSA CLI, enter in the following command to remove cluster-admin users:

    rosa revoke user cluster-admin --user=<idp_user_name> --cluster=<cluster_name>
    1. Replace <idp_user_name> and <cluster_name> with the name of the identity provider user and your cluster name.
  2. To remove dedicated-admin users, use this command instead:

    rosa revoke user dedicated-admin --user=<idp_user_name> --cluster=<cluster_name>
  3. Once submitted, check the admin list to ensure the user is no longer listed using the following command: 

    rosa list users --cluster=<cluster_name>

Now the intended user no longer has admin privileges. This could be helpful to maintain your security policies and reduce any potential access problems in the future. 

Red Hat logoGithubredditYoutubeTwitter

자세한 정보

평가판, 구매 및 판매

커뮤니티

Red Hat 문서 정보

Red Hat을 사용하는 고객은 신뢰할 수 있는 콘텐츠가 포함된 제품과 서비스를 통해 혁신하고 목표를 달성할 수 있습니다. 최신 업데이트를 확인하세요.

보다 포괄적 수용을 위한 오픈 소스 용어 교체

Red Hat은 코드, 문서, 웹 속성에서 문제가 있는 언어를 교체하기 위해 최선을 다하고 있습니다. 자세한 내용은 다음을 참조하세요.Red Hat 블로그.

Red Hat 소개

Red Hat은 기업이 핵심 데이터 센터에서 네트워크 에지에 이르기까지 플랫폼과 환경 전반에서 더 쉽게 작업할 수 있도록 강화된 솔루션을 제공합니다.

Theme

© 2026 Red Hat
맨 위로 이동